• Title/Summary/Keyword: MD5

Search Result 1,130, Processing Time 0.044 seconds

Studies on Fine Metal Droplet Jetting using Piezoelectric Inkjet Head (압전 잉크젯 헤드를 이용한 미세금속액적 토출 연구)

  • Park, Chang-Sung;Kim, Young-Jae;Sim, Won-Chul;Park, Jung-Hoon;Kang, Pil-Joong;Yoo, Young-Seuck;Joung, Jae-Woo
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.1550-1551
    • /
    • 2007
  • 노즐 직경 $30\;{\mu}$인 MEMS 압전 잉크젯 헤드를 이용하여 Ag 나노 잉크를 PDMS 처리된 PI(Polyimide) 기판 위에 토출하였다. 구동주파수 5 KHz에서 액적부피 1.5 pl, 속도가 약 4.5 m/s인 액적이 토출 되었다. 인쇄된 액적의 크기는 직경 약 $12\;{\mu}m$이었다. 메니스커스의 거동에 맞춘 구동파형의 입력에 의해 새틀라이트 없는 매우 작은 액적을 토출할 수 있었다.

  • PDF

Implementation of Encryption Module for Securing Contents in System-On-Chip (콘텐츠 보호를 위한 시스템온칩 상에서 암호 모듈의 구현)

  • Park, Jin;Kim, Young-Geun;Kim, Young-Chul;Park, Ju-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.11
    • /
    • pp.225-234
    • /
    • 2006
  • In this paper, we design a combined security processor, ECC, MD-5, and AES, as a SIP for cryptography of securing contents. Each SIP is modeled and designed in VHDL and implemented as a reusable macro through logic synthesis, simulation and FPGA verification. To communicate with an ARM9 core, we design a BFM(Bus Functional Model) according to AMBA AHB specification. The combined security SIP for a platform-based SoC is implemented by integrating ECC, AES and MD-5 using the design kit including the ARM9 RISC core, one million-gate FPGA. Finally, it is fabricated into a MPW chip using Magna chip $0.25{\mu}m(4.7mm{\times}4.7mm$) CMOS technology.

  • PDF

Design and Implementation of Web Authentication System Using MD5 and Crypt (MD5와 Crypt를 이용한 안전한 웹 인증 시스템의 설계 및 구현)

  • 윤현경;김완경;소우영
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2004.05a
    • /
    • pp.87-90
    • /
    • 2004
  • 현재 구축되고 있는 대부분의 업무용 시스템은 C/S 환경에서 벗어나 인터넷이라는 매체를 통해 하나의 웹 정보시스템으로 구축되어지고 있고 이를 업무시스템으로 활용하고 있다. 하지만 웹을 통한 정보 제공은 다수의 사용자에게 노출되어 있는 상태이며 여러 가지 보안 위험에 노출되어있는 것이 사실이다. 특히 Web시스템 초기 인증부분은 사용자의 ID 와 Password가 평문 이나 다름없는 단순인코딩 상태로 노출되는 문제점이 있다. 본 논문에서는 이러한 업무시스템의 불안전한 인증 시스템을 보완하고자 MD5 와 Crypt 함수에 기반 한 인증시스템의 구축을 위하여 웹 인증 메커니즘을 제안하고, 실제 인증 시스템에 적용하여 구현하였다.

  • PDF

Assessment of probiotic potential of Lactobacillus reuteri MD5-2 isolated from ceca of Muscovy ducks

  • Kamollerd, Chuchat;Surachon, Preeyaporn;Maunglai, Punchompoo;Siripornadulsil, Wilailak;Sukon, Peerapol
    • Korean Journal of Veterinary Research
    • /
    • v.56 no.1
    • /
    • pp.1-7
    • /
    • 2016
  • Lactic acid bacteria (LAB) are commonly used as probiotics in poultry. The present study employed in vitro and in vivo methods to select and test LAB isolated from Muscovy duck ceca as potential probiotics. In the in vitro study, 50 LAB were isolated from Muscovy duck ceca and tested for growth inhibition against Salmonella (S.) Enteritidis. Eleven isolates strongly inhibited S. Enteritidis and only 1 isolate (MD5-2) showing the strongest inhibition was selected for identification. This isolate was called as Lactobacillus (L.) reuteri MD5-2. For the in vivo investigation, 90 1-day-old Muscovy ducks were randomly assigned into three groups of 30 animals each (group 1, control; group 2, treated with $10^8$ colony-forming unit (CFU) of L. reuteri MD5-2 orally once on day 1; and group 3, treated with $10^8CFU$ of L. reuteri MD5-2 orally once daily from days 1 to 5). The ducks were housed in three large cages and raised for 50 days, after which body weight, duodenal villus height and crypt depth were measured. Both villus height and villus height to crypt depth ratio were significantly greater in group 3 than in groups 1 and 2. In conclusion, further investigation of L. reuteri MD5-2 as a potential probiotic strain is warranted.

Analysis of the Hashing and Encryption Algorithms Applied to the Linux (리눅스에 적용된 해시 및 암호화 알고리즘 분석)

  • Bae, Yu-Mi;Jung, Sung-Jae;Soh, Wooyoung
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.1
    • /
    • pp.72-78
    • /
    • 2016
  • MD-5 has been the hash algorithm to encrypt the user's password on Linux from the beginning. Recently the more reliable password management was demanded and SHA-512 algorithm became the hash algorithm on the recent Enterprise Linux which is more reliable than MD-5. This paper researching the characteristics of the hashing and encryption algorithms and find out about Linux User information management. Based on this analysis, and analysis of the security of the hashing algorithm is applied to the user password. In addition, analyzes the cases used hash algorithm applied to the validation of Open Source Software file, such as Apache, PHP, MySQL. Finally, by analyzing the security tool John The Ripper this paper suggests the enhanced security with the administrative management of passwords.

Comparison of treatment options in meniere's disease

  • Eshita, Ishrat Rafique
    • The Korean Journal of Food & Health Convergence
    • /
    • v.5 no.5
    • /
    • pp.27-31
    • /
    • 2019
  • Meniere's disease (MD) is a disease that affects the inner ear. It is formed as a result of endolymphatic hydrops. Hearing loss and vertigo are important in the diagnosis of MD. There is fluctuating and progressive hearing loss. Vertigo attacks cause severe dizziness in the patient. There are many treatment options in MD. These are hearing aid, diet, medication and surgery. In this study, we will discuss the advantages and disadvantages of the different treatment options. Treatment options have been compared to find out what the appropriate treatment is. Another concern is the importance of surgery in MD. This study is combination of qualitative and quantitative studies. Much focus will be on vertigo, and appropriate treatment options of MD will be mentioned also the importance of surgery. The main question in this study is the necessity of surgery. Surgical procedures are the most doubtful treatment option because of their indications and contraindications. In this study, it has been noticed that surgical operation should be delayed as much as possible. Priority is to try other treatment options. Surgery can be considered as a last resort. When we look at the operations performed, operations are mostly done in advanced Meniere cases.

Advanced WLAN Authentication Mechanism using One-time Session Key based on the Vulnerability Analysis in Nespot Wireless Lan System (Nespot 무선랜 사용자 인증 취약점 분석 및 일회용 세션키 기반 무선랜 인증 기법)

  • Lee, Hyung-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1101-1110
    • /
    • 2008
  • Nespot provides a convenient wireless internet connection service. The existing IEEE 802.1X EAP-MD5 authentication mechanism can be achieved based on ID/password information for a wireless connection. The Nespot system offers an advanced accounting and authorization procedure for providing wireless user authentication mechanism. However, many problems were found on the existing Nespot EAP-MD5 mechanism such as a ill value exposure, a leakage of personal information on wireless authentication procedure and a weakness on Nespot mutual authentication mechanism. Therefore, we analyzed the limitation of the existing IEEE 802.1X EAP-MD5 certification system, and suggested a one-time session key based authentication mechanism. And then we offered a simplified encryption function on the Nespot certification process for providing secure mutual authentication process.

  • PDF

Characterization of Bacillus thuringiensis Seven Isolates from Soil (토양에서 분리한 Bacillus thuringiensis 7균주의 특성)

  • 이형환;주대걸;강승철;임헌길
    • Microbiology and Biotechnology Letters
    • /
    • v.20 no.4
    • /
    • pp.377-383
    • /
    • 1992
  • Seven strains of Bacillus thuringiensis were isolated from soil in Korea and characterized. The isolates were named HL-8, 10, 12, 13, 14, 15 and 16 which produced parasporal crystals and endospores in their cells. The biochemical characteristics of the seven isolates were only minor different in specific chracteristics to the known serotypes of Bacillus thuringiensis. The number of the plasmid DNA elements from the isolates were studied. The computerized molecular weights of the six plasmid elements in the HL-8 and HL-lO strains were from 3.01 to 15.1 Md, four plasmid elements in the HL-12 were from 5.4 to 21.9 Md, four plasmid elements in HL-13 were from 5.1 to 20 Md, three plasmid elements in HL-15 were from 3.4 to 11.3 Md and three plasmid elements in the HL-16 were from 2.4 to 20.1 Md. The seven isolates showed resistances to ampicillin, bacitracin, cephalothin, methicillin and penicillin G. The strains of HL-8, HL-lO, HL12, HL-14, HL-15 and HL-16 showed lethalities against Culex pipiens 3rd instar larvae. The HL8 and 14 strains showed 100% lethality to the larvae within 48 hours. HL-13 strain did not have toxicity against the larvae.

  • PDF

Studies of Printing Head Fabrication Process For Mano Metal Printing System (메탈 인쇄용 압전 헤드 제작 프로세스 연구)

  • Yoo, Young-Seuck;Kim, Young-Jae;Sim, Won-Chul;Park, Chang-Sung;Joung, Jae-Woo;Oh, Yong-Soo
    • Proceedings of the KIEE Conference
    • /
    • 2006.07c
    • /
    • pp.1623-1624
    • /
    • 2006
  • It is a paper for design, manufacture and estimation of industry inkjet head. Simulations for Actuator, Ink flow and Ejection are executed for securing design ability. Relations between droplet and properties of ink are explained closely through simulation for nozzle. Actually, two silicon plates are made by dry and wet etching and directly bonded. PZT materials is attached on the bended ink flow part and cut to $540{\mu}m$ interval by dicing saw. Actuator was seen variation within 10% between simulation and actual head. Through the ejection estimation, it is shown that stabilized driving voltages change according to viscosity and surface tension of metal ink. Using the metal ink of viscosity of 4.8 cps and surface tension of 0.025 N/m, it is possible to eject the stable droplets with 5m/s, 20 pl, 5 kHz.

  • PDF

Molecular Dynamics Simulations of the OSS2 Model for Water and Oxonium Ion Monomers, and Protonated Water Clusters

  • Lee, Song-Hi
    • Bulletin of the Korean Chemical Society
    • /
    • v.23 no.1
    • /
    • pp.107-111
    • /
    • 2002
  • The OSS2 (Oj?me-Shavitt-Singer 2)[L. Oj?me et al., J. Chem. Phys. 109, 5547 (1998)] model for the solvated proton in water is examined for $H_2O,\;H_3O^+,\;H_5O_2^+,\;H_7O_3^+,\;and\;H_9O_4^-$ by molecular dynamics (MD) simulations. The equilibrium molecular geometries and energies obtained from MD simulations at 5.0 and 298.15 K agree very well with the optimized calculations.